Analysis
-
max time kernel
132s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 06:03
Static task
static1
Behavioral task
behavioral1
Sample
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe
-
Size
516KB
-
MD5
0021da726a32f0d55f2a81958da26ad4
-
SHA1
28acebd920aecd34689f18b261b407237886ba03
-
SHA256
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650
-
SHA512
fa6a07c2b093d71a16aea4ffdc4caeca79bb64bd7136f814b682d57152859f4b8004693e3755b58e080d4d2ae3326555f67d03e5803964f5e07e0093c79d15fd
Malware Config
Signatures
-
Taurus Stealer Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1300-61-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-63-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-64-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-66-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-67-0x000000000041CC20-mapping.dmp family_taurus_stealer behavioral1/memory/1300-69-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-71-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exedescription pid process target process PID 1760 set thread context of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1416 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exedescription pid process Token: SeDebugPrivilege 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exeInstallUtil.execmd.exedescription pid process target process PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe InstallUtil.exe PID 1300 wrote to memory of 872 1300 InstallUtil.exe cmd.exe PID 1300 wrote to memory of 872 1300 InstallUtil.exe cmd.exe PID 1300 wrote to memory of 872 1300 InstallUtil.exe cmd.exe PID 1300 wrote to memory of 872 1300 InstallUtil.exe cmd.exe PID 872 wrote to memory of 1416 872 cmd.exe timeout.exe PID 872 wrote to memory of 1416 872 cmd.exe timeout.exe PID 872 wrote to memory of 1416 872 cmd.exe timeout.exe PID 872 wrote to memory of 1416 872 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe"C:\Users\Admin\AppData\Local\Temp\d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:1416
-
-
-